Kainda et al., 2010 - Google Patents
Two heads are better than one: security and usability of device associations in group scenariosKainda et al., 2010
View PDF- Document ID
- 12154886725496645084
- Author
- Kainda R
- Flechais I
- Roscoe A
- Publication year
- Publication venue
- Proceedings of the Sixth Symposium on Usable Privacy and Security
External Links
Snippet
We analyse and evaluate the usability and security of the process of bootstrapping security among devices in group scenarios. While a lot of work has been done in single user scenarios, we are not aware of any that focusses on group situations. Unlike in single user …
- 238000000034 method 0 abstract description 17
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9660995B2 (en) | Methods, systems, and computer readable media for combating device theft with user notarization | |
Uzun et al. | Usability analysis of secure pairing methods | |
US9094388B2 (en) | Methods and systems for identifying, verifying, and authenticating an identity | |
Vaziripour et al. | Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications | |
Das et al. | A qualitative study on usability and acceptability of Yubico security key | |
US8807426B1 (en) | Mobile computing device authentication using scannable images | |
US11005661B1 (en) | Methods and systems for cryptographically secured outputs from telemedicine sessions | |
US11580559B2 (en) | Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials | |
Kainda et al. | Two heads are better than one: security and usability of device associations in group scenarios | |
Ion et al. | Influence of user perception, security needs, and social factors on device pairing method choices | |
Halunen et al. | Review of the use of human senses and capabilities in cryptography | |
Vaziripour et al. | I Don't Even Have to Bother Them! Using Social Media to Automate the Authentication Ceremony in Secure Messaging | |
US20240005414A1 (en) | Systems and methods for self and social discovery | |
Nithyanand et al. | Groupthink: Usability of secure group association for wireless devices | |
Uzun et al. | Pairing devices for social interactions: a comparative usability evaluation | |
CN102594820A (en) | Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things | |
WO2022095694A1 (en) | Blockchain node sharing method based on digital certificate, and product related thereto | |
US11968189B2 (en) | Methods and systems for generating a secure communication channel interface for video streaming of sensitive content | |
Jain et al. | New directions in social authentication | |
Mujeye | A survey on multi-factor authentication methods for mobile devices | |
Bonde | A Generative Artificial Intelligence Based Tutor for Personalized Learning | |
Rajendran et al. | Deniable Encrypted Messaging: User Understanding after Hands-on Social Experience | |
Bicakci et al. | How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification | |
Kainda et al. | Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels | |
Fassl | Usable authentication ceremonies in secure instant messaging |